Behavioral task
behavioral1
Sample
c13878f425167995ea5329706257f9493be43c2bd0ac610bd91d5ab5e0a05d95
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
c13878f425167995ea5329706257f9493be43c2bd0ac610bd91d5ab5e0a05d95
-
Size
193KB
-
MD5
adc600e64099e2c1ecb53b82d3286f03
-
SHA1
a71ada35808bd545d376b02e20c9be31d9cf7c4d
-
SHA256
c13878f425167995ea5329706257f9493be43c2bd0ac610bd91d5ab5e0a05d95
-
SHA512
4a2718ab29bf98b6e2b176bed78b6e21071f2c9e7bfb6eab249aa68fb1162c9e792ba44f678342a7769a792bec4559666f27925f55659b590b479716958bd388
-
SSDEEP
3072:BeJPheYi3PAb4thqZoJHLGQN50BmST0LMBbgwIv:EoYifAkKwHLrcBmST0LMBbgwIv
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c13878f425167995ea5329706257f9493be43c2bd0ac610bd91d5ab5e0a05d95.elf linux x86